Pen Tester In many businesses and corporations, There are hackers that are trying to stealInformation and personal data. People like these are called black hat hackers. Since we havehackers like these, this is where pen testers come into the picture. Pen testers’ roles are to usevarious tools for the specific use of exploiting a computer…
Author: tboak002
Article Review 2
Intro/Social ScienceIn this world today, due to the advancement of technology, people are able to commitcrimes sitting at home and usually these crimes are involved with stealing money from anotherindividual. An example of this is romance fraud. Romance scams occur when a fraudster takes acounterfeit identity to manipulate their victims into sending money to them….
Article Review 1
IntroductionIn this article it talks about how phishing attacks are occurring in Cross River State whichis located in the country Nigeria. These phishing attacks are being targeted at the corporateorganizations. It seems that phishing attacks are increasing and due to the fact thatcybercriminals keep sending out these counterfeit emails and due to this, Cross River…
Journal Entry 5
The meme that I have created is supposed to represent a person using a free Wi-Fi that is nearby. The monster in the picture is representing a hacker that put that free Wi-Fi there for the person to use. The person going up the stairs is representing him using free Wi-Fi without thinking anything of…
Journal Entry 4
Starting of at number one for individual motive that makes the most sense i would have to put For money as the first one because I feel like the majority of people in the world motivation in this life is to have a lot of money and some people will literally do anything to make…
Journal Entry 3
So starting off with the bottom of the pyramid, physiological needs how that relates to my experience with technology is that for example, I use an air conditioner to keep me warm in the house which is an essential need for every human being and also I use an electrical stove that can change the…
Journal Entry 2
How principles of science relate to cybersecurity is that in science your are trying to study or understand something. For example, Determinism is one of the principles of science and it says that behavior is caused or influenced by events. How that principle is related to cybersecurity is because we are also figuring out why…
Journal Entry 1
The areas I would like to work on in my career in terms of the NICE Framework is to protect and defend , investigate and to operate and maintain the reason why I chose these its because they are topics that I have researched before and have been interested in, the one that appeals to…
The CIA Triad
The CIA Triad consists of three things. Confidentiality, Integrity, and Availability. Thepurpose of the CIA Triad is to securely protect an organization’s data. The letter “C” in the triadstands for Confidentiality, which means that only people who are authorized are able to access orrevise data. “I” stands for Integrity, which means that the data must…
The Human Factor in Cybersecurity
Humans VS Technology- How I would balance the trade-off between training and additional technology is to mainly put my budget more on technology. I will put my budget more on technology because with technology there would be fewer human errors and it is more precise. The reason why I would put my budget more on…